Malware

Dropped:Application.Agent.JUC (B) removal

Malware Removal

The Dropped:Application.Agent.JUC (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Dropped:Application.Agent.JUC (B) virus can do?

  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • Attempts to connect to a dead IP:Port (6 unique times)
  • ‘Dropbox’ in HTML Title but connection is not HTTPS. Possibly indicative of phishing.
  • Drops a binary and executes it
  • Performs some HTTP requests
  • Unconventionial language used in binary resources: Turkish
  • Network activity contains more than one unique useragent.
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Anomalous binary characteristics

Related domains:

xred.mooo.com
freedns.afraid.org
ocsp.pki.goog
doc-14-14-docs.googleusercontent.com
www.dropbox.com
ocsp.digicert.com
xred.site50.net
www.000webhost.com
ocsp.comodoca.com
ocsp.usertrust.com

How to determine Dropped:Application.Agent.JUC (B)?


File Info:

crc32: C7A82160
md5: 0a732c641c6199a9fa6eec680bf5dbef
name: 0A732C641C6199A9FA6EEC680BF5DBEF.mlw
sha1: 974add85c072a1d6e8294ab9a7ae9cffbe37619f
sha256: ae1197340283c4bfb35c104333621173680101931c29769ebb50cc6649270902
sha512: 262883941289e91c2d477eee94b2762baa11a16087fa3d388cbdcc5b111865f6f40ac653ba88331c2668648458a2b06ff478c499a95e92604a7cf54531e852be
ssdeep: 24576:AnsJ39LyjbJkQFMhmC+6GD9NWXFBjFsQ7SCjO8LvxH0j6sn9:AnsHyjtk2MYC5GDTuFzjOySz9
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright:
InternalName:
FileVersion: 1.0.0.4
CompanyName: Synaptics
LegalTrademarks:
Comments:
ProductName: Synaptics Pointing Device Driver
ProductVersion: 1.0.0.0
FileDescription: Synaptics Pointing Device Driver
OriginalFilename:
Translation: 0x041f 0x04e6

Dropped:Application.Agent.JUC (B) also known as:

BkavW32.FamVT.GaionLTK.Trojan
K7AntiVirusVirus ( 0055903c1 )
Elasticmalicious (high confidence)
DrWebTrojan.DownLoader22.9658
CynetMalicious (score: 100)
CAT-QuickHealSus.Nocivo.E0011
ALYacDropped:Application.Agent.JUC
CylanceUnsafe
ZillyaTrojan.Delf.Win32.76144
SangforWin.Malware.Delf-6899401-0
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaTrojan:Win32/Starter.ali2000005
K7GWTrojan ( 0056a6201 )
Cybereasonmalicious.41c619
CyrenW32/Backdoor.OAZM-5661
SymantecML.Attribute.HighConfidence
ESET-NOD32Win32/Delf.NBX
ZonerTrojan.Win32.88102
APEXMalicious
AvastWin32:TrojanX-gen [Trj]
ClamAVWin.Malware.Delf-6899401-0
KasperskyBackdoor.Win32.DarkKomet.hqxy
BitDefenderDropped:Application.Agent.JUC
NANO-AntivirusTrojan.Win32.DarkKomet.fazbwq
ViRobotWin32.Zorex.A
MicroWorld-eScanDropped:Application.Agent.JUC
TencentVirus.Win32.DarkKomet.a
Ad-AwareDropped:Application.Agent.JUC
SophosGeneric ML PUA (PUA)
ComodoVirus.Win32.Agent.DE@74b38h
BitDefenderThetaAI:Packer.F5AF03D517
VIPREBehavesLike.Win32.Malware.eah (mx-v)
TrendMicroVirus.Win32.NAPWHICH.B
McAfee-GW-EditionBehavesLike.Win32.Generic.th
FireEyeGeneric.mg.0a732c641c6199a9
EmsisoftDropped:Application.Agent.JUC (B)
SentinelOneStatic AI – Malicious PE
JiangminWin32/Synaptics.Gen
AviraDR/Delphi.Gen
eGambitUnsafe.AI_Score_100%
KingsoftWin32.Hack.Darkkomet.hq.(kcloud)
MicrosoftWorm:Win32/AutoRun!atmn
GridinsoftMalware.Win32.Gen.sm!s1
ArcabitHEUR.VBA.Trojan.d
GDataWin32.Backdoor.Agent.AXS
AhnLab-V3Win32/Zorex.X1799
Acronissuspicious
McAfeeGenericRXMS-UK!0A732C641C61
MAXmalware (ai score=73)
VBA32TScope.Trojan.Delf
MalwarebytesLamer.Virus.FileInfector.DDS
PandaTrj/Genetic.gen
TrendMicro-HouseCallVirus.Win32.NAPWHICH.B
RisingVirus.Synaptics!1.CC9C (CLOUD)
YandexTrojan.GenAsa!ETONJRQzPLk
IkarusJS.Trojan-Downloader.Agent
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/CoinMiner.NBX!tr
AVGWin32:TrojanX-gen [Trj]
Paloaltogeneric.ml

How to remove Dropped:Application.Agent.JUC (B)?

Dropped:Application.Agent.JUC (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment